Building Long-Distance Health Care Network Using Minimized Portable Sensors and Active Alert System
Found in:
2013 16th International Conference on Network-Based Information Systems (NBiS)
By Chun-Che Shih, Kuang-Yi Chou, Huan-Chao Keh, Yuan-Cheng Cheng, Po-Yuan Yu, Nan-Ching Huang
Issue Date:September 2013
pp. 401-404
The accelerated aging population around the world will be more obvious. In the USA, there will be about 72 million people aged 65 by 2030, There will have nearly 36.98% of the elderly population in Taiwan until 2050. Those people will need health care too....

A Novel Man-Machine Cooperative Intelligent Reduction Algorithm
Found in:
Information and Computing Science, International Conference on
By Junpeng Yuan, Cheng Su, Jie Su
Issue Date:May 2009
pp. 281-284
Although the rough set theory can be deal with uncertain and incomplete knowledge with knowledge reasoning, but for complex systems and some new technology fields, simply rely on the machines learning, the results is not reliable. Absorb the expert knowled...

A Framework for Amazon EC2 Bidding Strategy under SLA Constraints
Found in:
IEEE Transactions on Parallel and Distributed Systems
By Shaojie Tang,Jing Yuan,Cheng Wang,Xiang-Yang Li
Issue Date:January 2014
pp. 2-11
With the recent introduction of Spot Instances in the Amazon Elastic Compute Cloud (EC2), users can bid for resources and, thus, control the balance of reliability versus monetary costs. Mechanisms and tools that deal with the cost-reliability tradeoffs un...

Test Coverage Optimization for Large Code Problems
Found in:
Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin,Chi-Heng Chou,Yuan-Cheng Lai,Tse-Yau Huang,Simon Chung,Jui-Tsun Hung,Frank C. Lin
Issue Date:March 2012
pp. 215-220
Because running all previous tests for the regression testing of a system is time-consuming, the size of a test suite of the system must be reduced intelligently with adequate test coverage and without compromising its fault detection capability. Five algo...

Improving the Accuracy of Automated GUI Testing for Embedded Systems
Found in:
IEEE Software
By Ying-Dar Lin,Edward T.-H. Chu,Shang-Che Yu,Yuan-Cheng Lai
Issue Date:January 2014
pp. 39-45
Automated GUIs test application user interfaces and verify their functionalities. However, due to the uncertainty of runtime execution environments, the device under test (DUT) might not reproduce GUI operations on time, resulting in test failures. The Sma...

A Novel Query Tree Protocol with Bit Tracking in RFID Tag Identification
Found in:
IEEE Transactions on Mobile Computing
By Yuan-Cheng Lai,Ling-Yen Hsiao,Hong-Jie Chen,Ching-Neng Lai,Jian-Wei Lin
Issue Date:October 2013
pp. 2063-2075
Tag anticollision has long been an important issue in RFID systems. To accelerate tag identification, some researchers have recently adopted bit tracking technology that allows the reader to detect the locations of collided bits in a collision slot. Howeve...

Research of Ontology and Semantic Web Apply for Building Information Model
Found in:
2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Ding-Yuan Cheng, Tzu-Chin Chao, Chi-Chun Lo, Chi-Hua Chen
Issue Date:September 2013
pp. 358-363
Building Information Modeling (BIM) and Industry Foundation Classes (IFC) data model are used widely in construction to increase communication and team efficiencies while working toward a building construction management. This research presents a semantic ...

Two Couple-Resolution Blocking Protocols on Adaptive Query Splitting for RFID Tag Identification
Found in:
IEEE Transactions on Mobile Computing
By Yuan-Cheng Lai,Chih-Chung Lin
Issue Date:October 2012
pp. 1450-1463
How to accelerate tag identification is an important issue in Radio Frequency Identification (RFID) systems. In some cases, the RFID reader repeatedly identifies the same tags since these tags always stay in its communication range. An anticollision protoc...

Credit Risk Measurement on Customers of B2B Market
Found in:
2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Jun Yuan,Cheng Yang
Issue Date:October 2012
pp. 83-86
By selecting customers' credit risk indicators of the domestic textile industry on the electronic trading market in China and using factor analysis method, clustering method, and ordered-logit model, it can be concluded that the comprehensive evaluation of...

Session Level Flow Classification by Packet Size Distribution and Session Grouping
Found in:
Advanced Information Networking and Applications Workshops, International Conference on
By Chun-Nan Lu,Ying-Dar Lin,Chun-Ying Huang,Yuan-Cheng Lai
Issue Date:March 2012
pp. 221-226
Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications obscure their network behaviors. While port number-based classifiers work only for some...

Automatic identification of Frankfurt plane and mid-sagittal plane of skull
Found in:
Applications of Computer Vision, IEEE Workshop on
By Yuan Cheng, Wee Kheng Leow, Thiam Chye Lim
Issue Date:January 2012
pp. 233-238
Automatic identification of the Frankfurt plane (FP) and mid-sagittal plane (MSP) of a human skull is a very important task. These planes are used to define important landmarks on the skull for surgery planning and guidance, forensic reconstruction, and an...

A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor Networks
Found in:
IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Zhiwu Huang,Yuan Cheng,Weirong Liu
Issue Date:November 2011
pp. 1646-1651
In wireless sensor networks, node energy resources are so limited that how to reduce energy consumption and prolong network lifetime become the primary factor that should be taken into account for the design of wireless sensor network routing protocols. In...

ACON: Activity-Centric Access Control for Social Computing
Found in:
Availability, Reliability and Security, International Conference on
By Jaehong Park,Ravi Sandhu,Yuan Cheng
Issue Date:August 2011
pp. 242-247
With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the average user, security and privacy has become a pressing problem that must be addres...

Inline Emulation for Paravirtualization Environment on Embedded Systems
Found in:
Real-Time Computing Systems and Applications, International Workshop on
By Yuan-Cheng Lee,Chih-Wen Hsueh,Rong-Guey Chang
Issue Date:August 2011
pp. 388-392
Virtualization has been widely adopted on servers for various purposes such as server consolidation, cloud computing, and so on. Recent years, the trend spreads on embedded systems, although it once seemed to be an impractical idea because of the limited c...

A User-Activity-Centric Framework for Access Control in Online Social Networks
Found in:
IEEE Internet Computing
By Jaehong Park,Ravi Sandhu,Yuan Cheng
Issue Date:September 2011
pp. 62-65
Today's ever-evolving online social networks (OSNs) need an effective and usable access control framework. OSN users typically have discretionary control over their content, relationships, and interactions, while the OSN's policies consolidate these indivi...

A New Data Clustering Algorithm
Found in:
International Conference on Internet Computing in Science and Engineering
By Yuan Cheng,Shaobin Huang,Tianyang Lv,Guofeng Liu
Issue Date:November 2010
pp. 106-111
Induction is a logical method to understand things, however, induction often can't sufficient reflect the necessity and the regularity of things, so it needs to be complemented by deduction. The traditional clustering algorithms add the categories based on...

Hierarchical Data Management for Spatial-Temporal Information in WSNs
Found in:
Sensor Technologies and Applications, International Conference on
By Kai-Chao Yang, Yuan-Cheng Yang, Chun-Lung Lin, Jia-Shung Wang
Issue Date:July 2010
pp. 435-440
Wireless sensor networks (WSNs) comprise a large number sensor devices with limited power and resource. One of the key design challenges in the sensor networks is to efficiently utilize limited local storage capacity at individual sensor nodes to store his...

Correcting over-exposure in photographs
Found in:
Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Dong Guo, Yuan Cheng, Shaojie Zhuo, Terence Sim
Issue Date:June 2010
pp. 515-521
This paper introduces a method to correct over-exposure in an existing photograph by recovering the color and lightness separately. First, the dynamic range of well exposed region is slightly compressed to make room for the recovered lightness of the over-...

A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
Found in:
IEEE Transactions on Computers
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:April 2011
pp. 594-601
Virus scanning involves computationally intensive string matching against a large number of signatures of different characteristics. Matching a variety of signatures challenges the selection of matching algorithms, as each approach has better performance t...

An Evolutionary Fuzzy Behaviour Controller Using Genetic Algorithm in RoboCup Soccer Game
Found in:
Hybrid Intelligent Systems, International Conference on
By Jong-Yih Kuo, Yuan Cheng Ou
Issue Date:August 2009
pp. 281-286
The problem of an effective behavior learning of autonomous robots is one of the most important tasks of the modern robotics. In fact, it is well known that the learning to optimize actions of autonomous agents in a dynamic environment is one of the most c...

Sleep Scheduling That Minimizes State Transitions for IEEE 802.16e Mobile Subscriber Stations
Found in:
New Trends in Information and Service Science, International Conference on
By Li-Hsing Yen, Chih-Yuan Cheng, Chun-Hsin Wang
Issue Date:July 2009
pp. 1341-1346
IEEE 802.16e devices may enter sleep mode to conserve energy. There has been some work studying how to schedule device's packet transmissions to maximize the device's sleep period while meeting associated QoS (quality of service) requirements. This paper p...

Research on developing healthy-life map guiding system
Found in:
International Conference on Services Systems and Services Management
By Chi-Chun Lo, Chi-Hua Chen, Hsiang-Ting Kao, Chih-Chien Lu, Ding-Yuan Cheng
Issue Date:June 2009
pp. 746-751
Healthy-Life tourism services are the trend of the future. In this paper, we propose an effective decision support systems (DSS), the Healthy-Life Map Guiding System (HMGS), which provides the introduction and commentaries of Healthy-Life scenic spots with...

Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms
Found in:
High Performance Computing and Communications, 10th IEEE International Conference on
By Yuan-Cheng Lai, Yen-Hung Chen
Issue Date:June 2009
pp. 432-437
IEEE 802.16 technology is a promising technology to solve the last mile problem by its wireless, long distance, and high-bandwidth transmission. However, there isn't any suitable simulator to evaluate the performance between different IEEE 802.16 bandwidth...

An multiuser Undo/Redo method for replicated collaborative modeling systems
Found in:
International Conference on Computer Supported Cooperative Work in Design
By Yuan Cheng, Fazhi He, Shuxu Jing, Zhiyong Huang
Issue Date:April 2009
pp. 185-190
Undo/Redo can help rolling the whole system back to some previous state. However, many group Undo/Redo researches are based on co-edit system of text object. This paper firstly addresses the Undo/Redo in 3D collaborative solid modeling system. After analys...

A Semantic Web Methodology for Situation-Aware Curative Food Service Recommendation System
Found in:
Computer Science and Software Engineering, International Conference on
By Chi-Chun Lo,Ding-Yuan Cheng,Chi-Hua Chen
Issue Date:December 2008
pp. 444-447
Recently curative food is becoming more popular, as more people realize its benefits. Based on the theory of Chinese medicine, food itself is medicine. The Curative food which is an ideal nutritious food can help to loss weight, increase immunity and is al...

Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Found in:
Advanced Information Networking and Applications, International Conference on
By Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai
Issue Date:March 2008
pp. 433-440
Differentiated quality of service is a way for a website operator to provide different service levels to its clients. Traditional HTTP request scheduling schemes can achieve this, but they schedule requests to manage only one server resource, such as CPU o...

A Study on Representation of QoS in UDDI for Web Services Composition
Found in:
Complex, Intelligent and Software Intensive Systems, International Conference
By Chi-Chun Lo, Ding-Yuan Cheng, Ping-Chi Lin, Kuo-Ming Chao
Issue Date:March 2008
pp. 423-428
With the increasing popularity of deploying web services, quality of service (QoS) becomes a significant concern for service consumers and providers for service selection. However, representing and storing the values of QoS attributes are problematic, as t...

A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor
Found in:
Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Kuo-Kun Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai
Issue Date:July 2005
pp. 113-118
<p>We propose a new Parallel Automaton string matching approach and its hardware architecture for content filtering coprocessor. This new approach can improve the average matching time of the Parallel Automaton with Pre-Hashing and Root-Indexing tech...

Three remedied algorithms for Advanced Waiting Time Scheduler
Found in:
Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Wei-Hsi Li
Issue Date:December 2002
pp. 617
The advanced waiting time priority scheduler (AWTP), modified from the waiting time priority scheduler (WTP), was proposed to achieve proportional delay differentiation. AWTP not only achieves more accurate delay proportion than the WTP scheduler no matter...

A Fair Admission Control for Large-Bandwidth Multimedia Applications
Found in:
Distributed Computing Systems Workshops, International Conference on
By Yuan-Cheng Lai, Yu-Dar Lin
Issue Date:July 2002
pp. 317
Current admission controls aiming to maximize network utilization create a bias against large-bandwidth calls. This paper proposes a BNP (buffer without preemption) model which will hold a call in a buffer rather than directly reject it when the residual b...

Improving the Performance of TCP Vegas in a Heterogeneous Environment
Found in:
Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai
Issue Date:June 2001
pp. 0581
Abstract: Many results indicate that TCP Vegas exhibits better throughput and higher stability than TCP Reno in homogeneous cases where a single version exists, but it performs poorly in heterogeneous cases where two versions coexist. Hence users delay, ev...

Unfairness of Measurement-Based Admission Controls in a Heterogeneous Environment
Found in:
Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Sheng-Fu Tsai
Issue Date:June 2001
pp. 0667
Abstract: Admission controls are required to determine whether new connections should be admitted to networks. These controls ensure the quality of service (QoS) for data transmission. This paper introduces three measurement-based admission control algorit...

Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks
Found in:
Information Networking, International Conference on
By Yuan-Cheng Lai, Ying-Dar Lin, Chih-Yu Chen, Huan-Yun Wey
Issue Date:February 2001
pp. 487
IETF Integrated Service Working Group has specified two service classes: Guaranteed Quality (GQ) service and Controlled Load (CL) service. What concerns service sub-scribers and providers most is the cost of these two services and their performance. For se...